검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 8

        1.
        2016.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        GSA (Gaming Standards Association)’s S2S (System to System) standard provides harmonizing protocol between any gaming and non-gaming host systems in the casino back office and Casino business area. Its technical details and implementation is rarely open to the academy and public. This paper discuss our ongoing implementation of S2S protocol engine and systems, which is, to our knowledge, the first case in Korea. Our design leverages open source technologies such as Linux, Python, Django, Tornado, JQuery, and lxml. Describing the architecture and an application scenarios of ‘PlayerInfo’ class, we demonstrate how the open source technology can be utilized in the S2S system design.
        4,000원
        2.
        2014.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The international casino game industry has adopted G2S (game to systems) protocol for the future communication standards between slot machines and gaming hosts. G2S protocol uses the internet protocols and XML message format. Not simply G2S protocol replaces the SAS protocol currently in use but with many limitations, but provides diverse application and business chances to the casino industry. In this paper, we introduce the overview of technical features of G2S system, and describe our design and implementation experience of core G2S protocol engine for slot machine devices. The G2S engine provides key protocol stack of G2S (HTTP, XML, and SOAP) and runtime services, using open source softwares and custom classes. The protocol compatibility of the implemented G2S engine is confirmed against an openG2S host software contributed by IGT. Also the measured memory size and perfroamcne is compact enough for typical slot machine hardware specification.
        4,000원
        3.
        2014.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
        In this paper, we propose an efficient real-time multi-user input processing algorithm and protocol for supporting a number of different types of user input from various input devices. The main objective of this multi-user input processing algorithm and protocol is to support multiple users to interact simultaneously with the interactive digital content using a variety of user input devices. This protocol is composed of two parts: the input terminal and the server. The input terminals are connected to input devices and the 1:1 value obtained by the selection, calibration, integration, analysis and then transmission to the server to be used for the user input to the contents. The server processes multi-user input information and applies the input processing algorithm to identify the user and then pass input information to the desired application. This paper presents the design and implementation of the multi-user input processing algorithm and protocol. It also describes how to build and execute a multi-user interactive Unity3D application based on this algorithm.
        4,000원
        4.
        2013.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The international and domestic revenue keep growing constantly, and nowadays the international casino game industry is getting upgraded utilizing IT technology. In contrast, due to many constraints and limitations, Korean IT society has not paid attention to the casino IT area. Slot machine is one of popular gaming systems in the casino. In this paper, we present our design and implementation of protocol analysis system for SAS 6.0 protocol. Slot machine accounting system (SAS) is an international standards protocol and provides auditing, management, and additional service for slot machines. Our protocol analysis system design experience provide in-depth understanding on slot machine and its accounting requirement than a simple conceptual introduction of protocol. Also, the key difficulties of SAS protocol implementation and performance requirement is examined. Our system successfully works in small portable embedded system and showed its benefits, showing benefits for debugging and reverse-engineer a real work problem with commercial system. The engine of the analysis software will be the base of real SMIB (slot machine interface board) system for commercial use.
        4,000원
        5.
        2010.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
        미취학 아동의 창의적 사고, 다양한 경험 기반의 학습 활동, 그리고 인성 및 감성 중심의 교육에 대한 욕구를 충족시켜줄 수 있는 새로운 교육 방식으로써 체감형 교육 방식의 보급이 활발해지고 있다. 체감형 학습은 사용자의 움직임이나 감각을 통해 디지털 교육 콘텐츠를 조작하는 인간-컴퓨터 인터랙션을 활용한 교육 방식이다. 그러나 사람의 움직임이나 목소리 같은 음성/영상 인식의 정확도가 높지 않아 실제 교육 시스템 적용에는 한계를 보인다. 이러한 한계점의 극복을 위해 인간과 서비스 콘텐츠 사이에 매개체를 두고 이를 통해 사람의 움직임을 가속도, 각속도와 같은 숫자 값으로 변환/전송하여 인터랙션 하는 매개 인터페이스 개념이 제안된다. 본 연구에서는, 교육 시스템의 대상인 미취학 아동의 행동을 관찰하고 프로토콜 분석을 통하여 사용자 중심의 매개 디바이스 디자인 요구사항을 제안한다. 분석 결과, 미취학 아동들은 물체를 조작하는 데 서툴고, 무의식적으로 물체를 만지작거리거나 기대는 행동을 보였다. 또한 물건을 사용할 때 그에 종속되어 행동의 부자연스러움을 보였다. 따라서 체감형 교육을 위한 매개 디바이스는 사용자의 익숙하지 않은 조작을 보조할 수 있어야 하며, 디바이스 사용 중에도 자연스러운 행동을 유지할 수 있도록 디자인되어야 한다.
        4,000원
        6.
        2007.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.
        4,000원
        7.
        2006.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        RFID/USN is important infrastructure of the ubiquitous society. And so, It is various and practical research is attempted. These two base technology have physical characteristic and complement relationship. Like this relationship is applied Following example that is system research which manages warehouse stocks and conditions. First, We adhere RFID Tag at the Pallet of the warehouse and do identification goods. And then, It grasps the environment state information of stocks with sensor module which has Zigbee wireless communication function. From like this process RFID Tag information and jop-control command of sensor node also it is exposed to air. Therefore, We control sensor node in USN/RFID environment through the mobile device. And system design for the security Apply of the process is main purpose of this paper's. We propose the condition and function of the mobile device to the secondary. And We define the relation of the sensor node with RFID to be arranged to a warehouse. Finally, This paper is designed to find a trade-off of the following viewpoints. First, We offer suitable sensor-control information to a actual manager. Second, We offer RFID tag security approach to control the action of the sensor. Third, It increases the survivability of sensor node form.
        5,200원
        8.
        2004.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The existing PKI authentication structure uses the OCSP method. The primary task of OCSP is to verify the status of a transaction after verifying the validity of the certificate; but, because of continuing policy changes and updates within the PKI authentication method, the status of certificates and the structures are not consistent. Therefore, the SCVP method can be selected as the broadest method for completing authentication tasks accurately because the SCVP method includes validation of policy changes. An appropriate method for building an mobile environment within the capabilities of low-memory and reduced processing CPU needs to be assessed and developed. This thesis proposes a verification method that is independent of platform and applicable to any 05 in building and expanding the mobile environment.
        4,600원